Learn More
The importance of utilizing biometrics to establish personal authenticity and to detect imposters is growing in the present scenario of global security concern. Also the Development of a biometric system for personal identification, which fulfills the requirement for access control of secured areas and other applications like identity validation for social(More)
Rapid growth in Electronic Medical Records (EMR) has emerged to an expansion of data in the clinical domain. The majority of the available health care information is sealed in the form of narrative documents which form the rich source of clinical information. Text mining of such clinical records has gained huge attention in various medical applications like(More)
The image cryptography is one of the techniques used in the data security during communication over public domain. In the many researchers are working to make the visual cryptography techniques more robust and secure against the attack. In this paper, we have proposed the visual cryptography in the video with the halftone image as a secrete image. We have(More)
Electronic Medical Records contains a rich source of information for medical finding. However, the access to the medical record is limited to only de-identified form so as to protect the confidentiality of patient. According to Health Insurance Portability and Accountability Act, there are 18 PHI categories that should be enclosed before making the EMR(More)
Entity extraction is one of the important tasks in various natural language processing (NLP) application areas. There has been a significant amount of works related to entity extraction , but mostly for a few languages (such as English, some European languages and few Asian languages) and doamins such as newswire. Nowadays social media have become a(More)
From past few decades mobile communication and web applications have made wireless network as apopular research. With technology of fast changing features wireless network moves frequently. Mobile nodes are occasionally confronted with reachability issue. In transmitting packets, generally void problem occurring is not fixed in advance. Thus resolving a(More)
  • 1